Truke – The Recent Menacing Member of the Ransomware Family

Transcription

Truke – The Recent Menacing Member of the Ransomware Family
Truke – The Recent Menacing Member of
the Ransomware Family
Guide To Remove Truke Ransomware
Truke is the name of the newly discovered Ransomware that belongs to the Djvu
Ransomware Family. It is reported to have infected a large number of systems
across the world so far. Infected e-mail attachments & torrent websites are the
prime means using which Truke Ransomware propagates its infection.
Once the system is infected, Truke employs AES & RSA cryptography method to
encrypt user & system files. It renames the files by appending “.truke” extension to
the filenames & hence makes them inaccessible to the users.
Threat Summary
Name
Truke
Type
Ransomware
Category
Malware
Operating System Impacted
Windows
Targeted Browser Google Chrome, Internet Explorer, Mozilla Firefox
Threat Behavior of Truke Ransomware
Truke Ransomware is the recent menacing member of the giant Malware Family. It
is a variant of the devious STOP (DJVU) Ransomware & has been detected to
spread its infection at an alarming rate.
Truke Cryptovirus encrypts & locks the user & system data found on the impacted
Hard-drive & even on the network-shared location. In order to make it arduous for
the users to recover their files, Truke uses strong cryptographies such as AES &
RAS. These highly-complex Encryption Algorithms require a complicated private
key to decrypt the files.
The original files names are renamed by appending .truke extension to the
filenames.
For example– The
“image1.jpg.truke”.
file
name
“image1.jpg”
might
be
renamed
as
The files targeted by the Truke Ransomware may include files with the extensions
mentioned below-
Document files (.docx, .doc, .odt, .rtf, .text, .pdf, .htm, .ppt)
Audio Files (.mp3, .aif, .iff, .m3u, .m4u, .mid, .mpa, .wma, .ra, .avi, .mov, .mp4)
Video Files (.3gp, .mpeg, .3g2, .asf, .asx, .flv, .mpg, .wmv, .vob)
Images (.jpg, .jpeg, .raw, .tif, .gif, .png)
Backup Files (.bck, .bckp, .tmp, .gho)
The primary purpose behind encrypting the files is to extort money by making the
victims pay Ransom for the encrypted files.
Following the encryption, Truke Virus generates a ransom note in text format
named as “_readme.txt”. A Copy of this ransom note is dropped in every existing
folder.
The Ransom Note & Amount for Truke Ransomware
Truke Ransomware delivers a ransom-demanding note on the infected system
which is in the text format & named as “_readme.txt”.
The note appears in the form of a program window & holds the title – “Attention”.
The Ransom Note for the Truke Ransomware states that the all the files are
encrypted with a complex encryption method & a private key.
To purchase the decryption key, victims are required to pay a ransom amount of
$980. In case, the victim contacts the hackers within 72 hours of encryption, they
will receive 50% discount on the ransom amount, which is $490.
In addition to that, users are asked to contact the hackers on the e-mail address –
gorentos@bitmessage.ch or ferast@firemail.cc.
The ransom note further prompts the users to send one encrypted file to the
Truke’s developers, which will be restored for free & sent back to the victim as a
guarantee that files can be actually decrypted.
Despite of such claims, victims are advised not to make any payment to the
hackers. Research analysis has shown that the hackers usually avoid the victims
once the ransom amount has been received.
It is evident that paying Ransom Amount yields no positive result; hence all the
encouragements to pay ransom & contact the hackers should be ignored.
Users must ensure to regular back their data, be vigilant while visiting torrent
websites & avoid clicking on the spam e-mail attachments.
Distribution Techniques of Truke Ransomware–
The hackers behind Truke Ransomware use various techniques to propagate its
infection. These may include:
1). Spam E-mail campaigns & infected attachments
2). Unreliable Third-party software download sources
3). Unofficial download sources (free file-hosting sites, P2P networks)
4). Fake Software Cracks/updaters, freeware, shareware
5). Software Bundling can download Trojans, Ransomware & other malware.
6). By visiting questionable torrent websites & other malware-laden sites
How to Remove Truke Ransomware infection from the system